Introduction

Completed

Attackers can use various threat vectors to access targets within an organization. They can methodically work their way from one step to another in the kill chain after compromising a user or computer.

This module introduces you to several features in Microsoft 365 that can help:

  • protect your organization against cyberthreats.
  • detect a compromised user or computer.
  • monitor your organization for suspicious activities.

The feature areas discussed in this training fall under the Microsoft Defender XDR umbrella. They include:

  • Microsoft Defender for Office 365
  • Microsoft Defender for Identity
  • Microsoft Defender for Endpoint
  • Microsoft Defender for Cloud Apps

Note

Microsoft 365 Defender is now Microsoft Defender XDR (Extended Detection and Response).

This module provides a high-level overview of each of these areas. You examine them in greater detail in later training. This module also introduces you to Microsoft 365 Threat Intelligence.

Note

Microsoft Defender for Office 365, Threat Intelligence, Advanced Security Management, and most of the Alert capabilities require a Microsoft 365 E5 subscription for your organization. If you don't have that plan and want to try these features, you can sign up for a trial of Microsoft 365 Enterprise E5.